Tuesday, March 20, 2012

Week 2

Date: 23rd - 27th January 2012

Attended 2nd FYP Briefing at Gemilang Hall on 26/01/12. We were instructed to get started with our FYP Blog and failure to publish will results in 3% marks deduction. Had a short meeting with FYP Advisor, Mdm Norziany, discussion on how to proceed with the project. I am going to develop for software part by using visual basic software.

Week 1

Date: 16th - 20th January 2012

Attended FYP Briefing on Thursday (19/01/12) at Gemilang Hall. The briefing agenda was mainly pertaining RPS whereby we need to update our student profile. We are instructed to create a blog instead of using Log Book for our weekly progress report.

Progress Sem 1

Work complete from week 2 in July and Week 14 in October 2011
During this period, I finished the first step of the report which creates graphical user interface and database. The system is used visual basic. Furthermore, visual basic software system, I produce the Loginform. This Loginform, the data in the database have protection from outsider except people who manage that. While for database system, I produce table to store any of data or result from biometric system. When the result comes, it will store inside the table and not be loss. These two steps are the first beginning for the biometric system. The quality target for this project is it can help user to find the data inside the output device and also not be to worry about the result will be loss.
I also will start working on the second steps of this project which will include how to linking the both of VB and MC Access. Besides, the second section will be complete the communication circuit. For communication circuit, I use RS323 chip. The biometric system discusses about important to store and save result or data and also the personal detail of the user and the system only works for the authenticated/registered individual. Thus, this project is also important to expose me how to communicate the circuit to transfer the data from hardware to software.

Work to be completed by April 2012
Next, I need to finish the steps on hardware and linked between visual basic and Microsoft Access. This will be completed by April 2012. The next section is also to link the VB and MS Access. These tasks need to complete to know whether it can run as I aspect or not. Then, I will write the report, conclusion and management implication for the final report of this project. The entire project should be completed by the first week of April 2012.

Problems Encountered
During the research of the suitable component, I have problems with the situation on how to choose which one is better to use. Besides, the problem faces also on software which is about VB and MS Access. Both VB and MS Access need to be linking. It means after put the username and password correctly, the next page will be come out is MS Access. Here the data transaction will be store. To correct the problem faces, I must know more about the software which is VB and MS Access. Hope this project will be done on due date. However, the project is still on schedule and will proceed as how the project was planned.

Conclusion
My research project is on schedule and I should encounter and hope there is doing not have any problem to finish that project. In addition, the project will be run and output will get and transfer to data logger. Furthermore, the project shall be finishing it by April 2012.

Wednesday, March 14, 2012

Biometric system

The purpose of this project is to store data from hardware development which is finger assessment system force calibration result. Besides, the project is developing to create data logger. Meanwhile, the project is made to expose me by using GUI and database system. Here, the project will be built using VB and Microsoft Access. This progress report discusses the progression I have made from July to October 2010.

Visual Basic



A version of the BASIC programming language from Microsoft specialized for developing Windows applications. When first released in 1991, it was similar to Microsoft's QuickBASIC. With its visual user interface development tools, Visual Basic became very popular by the mid-1990s. Visual Basic 6.0, which was released in early 1999, was the last version of Visual Basic to be offered as a stand-alone development product. Visual Basic became part of Visual Studio.NET.

Visual Basic for Applications (VBA) is a subset that provides a common macro language included with many Microsoft applications.

Up until VB 5, the Visual Basic compiler only converted the source code written by the programmer into an intermediate language called "bytecode." Starting with VB 5, native executable programs can be generated.

The VB Runtime Module
No matter what the version, in order to run a VB program, the VB runtime module must reside in the target computer. This .DLL file, named VBRUNxxx (up to VB 4) or MSVBVMxx (VB 5 and 6), where x is the version number, contains necessary runtime libraries and also converts programs compiled to bytecode into the machine language of the computer. The runtime DLLs are widely available and typically accompany a Visual Basic application. See VB.NET and VBScript.

Monday, February 20, 2012

Introduction

Security is the degree of protection against danger, loss, and criminals. Security has to be compared and contrasted with other related concepts safety continuity and reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction. Security as a form of protection is structures and processes that provide or improve security as a condition. Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic traits computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided in two main classes:

  • Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina.

  • Behavioral are related to the behaviour of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviour metrics for this class of biometrics.

Abstract

Biometric technology is fast gaining popularity as means of security measures to reduce cases of fraud and theft due to its use of physical characteristics and traits for the identification of individuals. The earliest methods of biometric identification include fingerprint and handwriting while more recent ones include iris/eye scan, face scan, voice print, and hand print. Biometric fingerprint recognition and identification technology focuses on training the system to recognize an individual unique fingerprint characteristic. The technology lends itself well to a variety of uses and applications, including security access control for door (also known as fingerprint lock), border control and automobile manufacturers (to dramatically reduce theft and carjacking). The system composed of finger print reader, microcontroller and the Visual Basic software. The microcontroller circuit controlling access to a door is built to test the reliability of this finger print controlled security system and the software is as the interface between the personal computer and the Biometric Security System. This project enable user to open the door just by using their thumbnail and the system software at the personal computer will show the transaction which is the date and time and also the personal detail of the user and the system only works for the authenticated/registered individual. Testing conducted on the system proved that it is able to provide security access control successfully.

Circuit Diagram

Rabbit core RCM3750

RCM 3750 subsystem.

Use of Rabbit 3000 port.

RJ-45 Ethernet Port Pinout

Block Diagram